It isn't pretty but:
dd if=/dev/wd1a skip=8244 bs=1 count=4 | hexdump -C
4+0 records in
4+0 records out
4 bytes transferred in 0.001 secs (3263 bytes/sec)
00000000  41 00 00 00                                       |A...|
00000004

wd1a is the cooked RAID partition.  In this case this is an AOE target.
If it was crypto it would have been 4c 00 00 00 |C...|

Currently the possible values are: 0x00 (RAID 0), 0x01 (RAID 1), 0x41
(AOE target), 0x4c (CRYPTO) & 0x61 (AOE initiator).
Note that softraid is not endian neutral so on big endian machines the
numbers are flipped.

FWIW,
/marco

On Fri, Dec 12, 2008 at 01:33:14PM +0100, Michael wrote:
> Todd T. Fries schrieb:
> > tried 
> > 
> >     bioctl -h softraid0
> > lately?
> 
> 
> Well, yes... but it only works if I already activated the softraid device...
> 
> # bioctl -h softraid0
> Volume  Status               Size Device
> softraid0 0 Online               3.8G sd1     CRYPTO
>       0 Online               3.8G 0:0.0   noencl <sd0a>
> # bioctl -d sd1
> # bioctl -h softraid0
> 
> 
> ...but I would like to know what kind of type sd0a is before I try to use
> 
> bioctl -c [01C] -l /dev/... softraid0
> 
> to be able to use bioctl from a script, only for CRYPTO.
> 
> Only other way I currently see is to set the label from disklabel of sd0
> to some name and check what to do from that information.

Reply via email to